Knowledge (XXG)

Access badge

Source 📝

122:
organization has a different facility code and their card set also increments from 1. Thus different organizations can have card sets with the same card numbers but since the facility codes differ, the cards only work at one organization. This idea worked fine for a while but there is no governing body controlling card numbers, different manufacturers can supply cards with identical facility codes and identical card numbers to different organizations. Thus there is a problem of duplicate cards. To counteract this problem some manufacturers have created formats beyond 26 bit Wiegand that they control and issue to an organization.
29: 105:
was used in early access cards. This method was abandoned in favor of other proximity technologies. The new technologies retained the Wiegand upstream data so that the new readers were compatible with old systems. Readers are still called Wiegand but no longer use the Wiegand effect. A Wiegand reader
121:
A common proximity format is 26 bit Wiegand. This format uses a facility code, also called a site code. The facility code is a unique number common to all of the cards in a particular set. The idea is an organization has their own facility code and then numbered cards incrementing from 1. Another
97:
that makes access control decisions based on information about the credential. If the credential is included in an access control list, the access control system unlocks the controlled access point. The transaction is stored in the system for later retrieval; reports can be generated showing the
125:
In the 26 bit Wiegand format bit 1 is an even parity bit. Bits 2-9 are a facility code. Bits 10-25 are the card number. Bit 26 is an odd parity bit. Other formats have a similar structure of leading facility code followed by card number and including parity bits for error checking.
118:. The integrated circuit outputs the card number to the coil which transmits it to the reader. The transmission of the card number happens in the clear—it is not encrypted. With basic understanding of radio technology and of card formats, Wiegand proximity cards can be hacked. 132:
can be used to counteract the problems of transmitting card numbers in the clear and control of the card numbers by manufacturers. Smart cards can be encoded by organizations with unique numbers and the communication between card and reader can be
93:. This number is usually called the facility code and is programmed by the administrator. The number is sent to an access control system, a 62:
Access badges use various technologies to identify the holder of the badge to an access control system. The most common technologies are
21: 302: 17: 241: 110:. When a card is presented to the reader, the reader's electrical field excites a coil in the card. The coil charges a 201: 323: 256: 236: 226: 63: 161: 115: 261: 231: 166: 221: 79: 306: 266: 196: 181: 94: 299: 281: 246: 146: 102: 67: 45: 28: 317: 186: 176: 83: 216: 211: 156: 129: 90: 48: 276: 271: 206: 171: 151: 107: 75: 41: 134: 111: 56: 251: 191: 106:
radiates a 1" to 5" electrical field around itself. Cards use a simple
71: 16: 300:
Southern Utah University in View, Fall 2004, Alumni Awards, pages 3-4
98:
date/time the card was used to enter the controlled access point.
27: 15: 52: 32:
A private security officer with an access card/ID card
89:
The access badge contains a number that is read by a
82:. The magnetic stripe ID card was invented by 44:used to gain entry to an area having automated 8: 292: 7: 59:, parking gates or other barriers. 14: 242:Physical Security Professional 1: 340: 114:and in turn powers an 51:. Entry points may be 33: 25: 202:IP video surveillance 31: 19: 257:Security engineering 237:Photo identification 227:Magnetic stripe card 305:2011-10-27 at the 162:Common Access Card 116:integrated circuit 34: 26: 24:Common Access Card 262:Security lighting 232:Optical turnstile 167:Computer security 80:biometric devices 331: 309: 297: 222:Logical security 339: 338: 334: 333: 332: 330: 329: 328: 314: 313: 312: 307:Wayback Machine 298: 294: 290: 267:Security policy 197:ID card printer 182:Electronic lock 143: 95:computer system 64:magnetic stripe 12: 11: 5: 337: 335: 327: 326: 316: 315: 311: 310: 291: 289: 286: 285: 284: 282:Wiegand effect 279: 274: 269: 264: 259: 254: 249: 247:Proximity card 244: 239: 234: 229: 224: 219: 214: 209: 204: 199: 194: 189: 184: 179: 174: 169: 164: 159: 154: 149: 147:Access control 142: 139: 103:Wiegand effect 46:access control 13: 10: 9: 6: 4: 3: 2: 336: 325: 322: 321: 319: 308: 304: 301: 296: 293: 287: 283: 280: 278: 275: 273: 270: 268: 265: 263: 260: 258: 255: 253: 250: 248: 245: 243: 240: 238: 235: 233: 230: 228: 225: 223: 220: 218: 215: 213: 210: 208: 205: 203: 200: 198: 195: 193: 190: 188: 187:Fortification 185: 183: 180: 178: 177:Door security 175: 173: 170: 168: 165: 163: 160: 158: 155: 153: 150: 148: 145: 144: 140: 138: 136: 131: 127: 123: 119: 117: 113: 109: 104: 99: 96: 92: 87: 85: 84:Forrest Parry 81: 77: 73: 69: 65: 60: 58: 54: 50: 47: 43: 39: 30: 23: 18: 295: 217:Lock picking 212:Locksmithing 157:Card printer 128: 124: 120: 100: 88: 78:and various 61: 49:entry points 38:access badge 37: 35: 324:Identifiers 130:Smart cards 91:card reader 76:smart cards 20:An example 288:References 277:Swipe card 272:Smart card 172:Credential 152:Biometrics 108:LC circuit 86:in 1960. 57:turnstiles 42:credential 135:encrypted 112:capacitor 68:proximity 318:Category 303:Archived 252:Security 207:Keycards 141:See also 192:ID Card 72:barcode 53:doors 40:is a 101:The 36:An 22:DoD 320:: 137:. 74:, 70:, 66:, 55:,

Index


DoD

credential
access control
entry points
doors
turnstiles
magnetic stripe
proximity
barcode
smart cards
biometric devices
Forrest Parry
card reader
computer system
Wiegand effect
LC circuit
capacitor
integrated circuit
Smart cards
encrypted
Access control
Biometrics
Card printer
Common Access Card
Computer security
Credential
Door security
Electronic lock

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.